Modelling Ciphersuite and Version Negotiation in the TLS Protocol
暂无分享,去创建一个
[1] Alfredo Pironti,et al. Proving the TLS Handshake Secure (as it is) , 2014, IACR Cryptol. ePrint Arch..
[2] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[3] Douglas Stebila,et al. On the security of TLS renegotiation , 2013, IACR Cryptol. ePrint Arch..
[4] Zheng Yang,et al. On the Security of the Pre-shared Key Ciphersuites of TLS , 2014, Public Key Cryptography.
[5] Jörg Schwenk,et al. Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol , 2014, CCS.
[6] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[7] Frederik Vercauteren,et al. A cross-protocol attack on the TLS protocol , 2012, CCS.
[8] Bruce Schneier,et al. Analysis of the SSL 3.0 protocol , 1996 .
[9] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[10] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[11] Jakob Jonsson,et al. On the Security of RSA Encryption in TLS , 2002, CRYPTO.
[12] Jörg Schwenk,et al. On the Security of TLS-DH and TLS-RSA in the Standard Model , 2013, IACR Cryptol. ePrint Arch..
[13] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[14] Bogdan Warinschi,et al. A Modular Security Analysis of the TLS Handshake Protocol , 2008, ASIACRYPT.
[15] Kenneth G. Paterson,et al. On the Security of the TLS Protocol: A Systematic Analysis , 2013, IACR Cryptol. ePrint Arch..
[16] Bodo Möller,et al. TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks , 2015, RFC.
[17] Eric Rescorla,et al. Transport Layer Security (TLS) Renegotiation Indication Extension , 2010, RFC.
[18] Marc Fischlin,et al. Less is more: relaxed yet composable security notions for key exchange , 2013, International Journal of Information Security.
[19] Tibor Jager,et al. On the Security of TLS-DHE in the Standard Model , 2012, CRYPTO.
[20] Alfredo Pironti,et al. Implementing TLS with Verified Cryptographic Security , 2013, 2013 IEEE Symposium on Security and Privacy.
[21] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[22] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[23] Renegotiating TLS , 2009 .
[24] Kenneth G. Paterson,et al. Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol , 2011, ASIACRYPT.